TS-501 5G Telecom Security Hands-On




Ask us about upcoming dates!


With the growth in 5G proof-of-concepts and early deployment, 5G market adoption and usage direction are increasing and being set in place as operators prepare for massive deployment.

This 5G Training Session (TS-501) will help security and telecom professionals get an understanding of the key concepts of 5G, their security, the implementation of such architectures and the impact in terms of related risks.

All trainees will receive the full deck of the training materials at the conclusion of the session.

Key Learning Objectives

  • Gain a thorough undestanding of 5G architectures and respective deployment options
  • Learn system and infrastructure level deployments, danger areas and security principles
  • Understand security impacts of new 5G protocols
  • Evaluating risks and attacks on isolation in a multi-tenant environment

Prerequisite Knowledge

  • Good knowledge of 4G architectures and security (LTE & EPC)
  • Basic knowledge of telecom & network principles:
    • What is 2G, 3G;
    • OSI network layers;
    • Basic knowledge of telecom technologies.
  • Good knowledge and usage of Wireshark

Hardware / Software Requirements




Expand All



5G Architectures

Different architectures and impact on security

5G Components

Components of 5G deployments and danger areas

5G Domain Security


5G Phase 1: Non-Standalone Architecture (NSA) and Security

o 5G Non-Standalone Architectures: EN-DC
o Evolution of the S1 and X2 E-UTRAN interfaces

5G RAN and Virtualized RAN

o 5G New Radio interface
o gNodeB modularity, virtualization and deployment options


UE, Handsets and SoCs

5G System Security Principles applied to 5G subscribers

o Anonymization of subscriber’s fixed identity
o Authentication and Key Agreement (AKA)
o Encryption and integrity protection of control-plane and
user-plane traffic
o Activation of the security and related signalling procedures

Impact of new 5G protocols in term of security:

o X2 extensions for NSA deployment
o F1, E1, Xn and N2 / N3
o PFCP and SBI (Service-Based Interface)

5G Core

5G Core, Service Based Architecture (SBA), Roaming and Interconnect Security

Infrastructure level deployment

Deployment, security & risk of NFV (Network Functions Virtualisation)

5G Slicing

Benefit and risk of 5G slicing in term of Security

5G Multi-tenant Environment

Understand the risks and attacks on isolation in a 5G multi-tenant environment (Slicing, NFV, SDN)

5G Testbeds

5G testbeds, network stacks and open-source software


Hands-on questions and exercises

Closing Remarks